Sciweavers

2492 search results - page 494 / 499
» False-Name-Proofness in Social Networks
Sort
View
CCS
2008
ACM
13 years 9 months ago
A look in the mirror: attacks on package managers
This work studies the security of ten popular package managers. These package managers use different security mechanisms that provide varying levels of usability and resilience to...
Justin Cappos, Justin Samuel, Scott M. Baker, John...
CEAS
2008
Springer
13 years 9 months ago
The Effectiveness of Whitelisting: a User-Study
We believe this paper is the first extensive user-study of whitelisting email addresses. While whitelists are common in social networking and instant messaging (e.g., buddylists),...
David Erickson, Martin Casado, Nick McKeown
ICPW
2007
13 years 9 months ago
Mind the gap!: Transcending the tunnel view on ontology engineering
The key objective of communal knowledge sharing at the scale of the World Wide Web is the ability to collaborate and integrate within and between communities. Ontologies, being fo...
Pieter De Leenheer, Stijn Christiaens
ICWSM
2008
13 years 9 months ago
StoryUpgrade: Finding Stories in Internet Weblogs
The phenomenal rise of Internet weblogging has created new opportunities for people to tell personal stories of their life experience, and the potential to share these stories wit...
Andrew S. Gordon, Reid Swanson
SIROCCO
2008
13 years 9 months ago
Recovering the Long-Range Links in Augmented Graphs
The augmented graph model, as introduced by Kleinberg (STOC 2000), is an appealing model for analyzing navigability in social networks. Informally, this model is defined by a pair...
Pierre Fraigniaud, Emmanuelle Lebhar, Zvi Lotker